@incollection{, B217C5E0D03E97F63521978FD2653ABC , author={{Prasanna BT} and {C BAkki} and {East Point College of Engineering and Technology}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1511728 } @book{b0, , title={{Above the Clouds: A Berkeley View of Cloud Computing}} , author={{ MArmbrust }} , year={Feb 2009} } @incollection{b1, , title={{Cryptographic cloud storage}} , author={{ SKamara } and { KLauter }} , booktitle={{RLCPS}} Heidelberg , publisher={Springer} , year={January 2010} } @incollection{b2, , title={{Modern information retrieval: A brief overview}} , author={{ ASinghal }} , journal={{IEEE Data Engineering Bulletin}} 24 4 , year={2001} } @book{b3, , title={{Security Guidance for Critical Areas of Focus in Cloud Computing}} , year={2009} Cloud Security Alliance } @book{b4, , title={{Searching in encrypted data}} , author={{ RBrinkman }} , year={2007} University of Twente , note={PhD thesis} } @book{b5, , title={{}} , author={{ NingCao }} } @book{b6, , title={{}} , author={{ CongWang }} } @book{b7, , title={{}} , author={{ MingLi }} , address={Kui Ren} } @incollection{b8, , title={{Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,' Parallel and Distributed Systems}} , author={{ WenjingLou }} , journal={{IEEE Transactions on}} 25 1 222 , year={Jan. 2014} } @book{b9, , title={{}} , author={{ Dawn XiaodingSong }} } @incollection{b10, , title={{Practical techniques for searches on encrypted data}} , author={{ DWagner } and { APerrig }} 10.1109/SECPRI.2000.848445 , booktitle={{Proceedings. 2000 IEEE Symposium on}} 2000 IEEE Symposium on , year={2000. 2000. 2000} 55 , note={Security and Privacy} } @incollection{b11, , title={{Fuzzy Keyword Search Over Encrypted Data in Cloud Computing}} , author={{ JLi }} , booktitle={{Proc. IEEE INFOCOM '10 Mini-Conf}} IEEE INFOCOM '10 Mini-ConfSan Diego, CA , year={Mar. 2010} } @incollection{b12, , title={{Authorized Private Keyword Search over Encrypted Data in Cloud Computing}} , author={{ MLi }} , booktitle={{31st Int'l. Conf. Distributed Computing Systems}} , year={2011} } @incollection{b13, , title={{Public key encryption with keyword search}} , author={{ DBoneh } and { GDCrescenzo } and { ROstrovsky } and { GPersiano }} , booktitle={{Proc. of EUROCRYPT}} of EUROCRYPT , year={2004} } @incollection{b14, , title={{Secure Ranked Keyword Search Over Encrypted Cloud Data}} , author={{ CWang }} , booktitle={{Proc. ICDCS '10}} ICDCS '10 , year={2010} } @book{b15, , title={{}} , author={{ WenjunLu }} } @incollection{b16, , title={{Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization}} , author={{ ALVarna } and { MinWu }} , journal={{Access}} 2 , year={2014} , note={IEEE} } @incollection{b17, , title={{Secure knn computation on encrypted databases}} , author={{ WKWong } and { DWCheung } and { BKao } and { NMamoulis }} , booktitle={{Proc. of SIGMOD}} of SIGMOD , year={2009} } @incollection{b18, , title={{Security Challenges for the Public Cloud}} , author={{ KRen } and { CWang } and { QWang }} , journal={{IEEE Internet Computing}} 16 1 , year={2012} } @incollection{b19, , title={{Multikeyword Ranked Search Supporting Synonym Query over Encrypted Data in Cloud Computing}} , author={{ ZhangjieFu }} , booktitle={{IEEE Conference}} , year={2013} } @incollection{b20, , title={{Searchable symmetric encryption: improved definitions and efficient constructions}} , author={{ RCurtmola } and { JAGaray } and { SKamara } and { ROstrovsky }} , booktitle={{ACM CCS}} , year={2006} } @incollection{b21, , title={{Implementation of Secure Ranked Keyword Search by Using RSSE}} , author={{ PNaresh } and { KPavan Kumar } and { DKShareef }} , journal={{International Journal of Engineering Research & Technology (IJERT)}} 2278-0181 } @incollection{b22, , title={{Privacy preserving ranked search on public key encrypted data}} , author={{ SBuyrukbilen } and { SBairas }} , booktitle={{Proc. IEEE International Conference on High Performance Computing and Communications (HPCC)}} IEEE International Conference on High Performance Computing and Communications (HPCC) , year={November 2013} } @incollection{b23, , title={{Space/time trade-offs in hash coding with allowable errors}} , author={{ BHBloom }} , journal={{Communications of the ACM}} 13 7 , year={1970} } @incollection{b24, , title={{Single-database private information retrieval with constant communication rate}} , author={{ CGentry } and { ZRamzan }} , booktitle={{ICALP}} , year={2005} } @book{b25, , title={{Privacypreserving keyword search over encrypted data in cloud computing, Insecure Cloud computing}} , author={{ YTHou } and { HLi } and { WLou } and { WSun } and { ;SJajodia }} , year={2014} , publisher={Springer} } @incollection{b26, , title={{Privacy-preserving multikeyword text search in the cloud supporting similarity-based ranking}} , author={{ WSun } and { BWang } and { NCao } and { MLi } and { WLou } and { YTHou } and { HLi }} , booktitle={{Proceedings of the 8th ACMSIGSAC symposium on Information}} the 8th ACMSIGSAC symposium on Information , publisher={ACM} , year={2013} } @incollection{b27, , title={{A Survey on Homomorphic and Searchable Encryption Security Algorithms for Cloud Computing}} , author={{ BTPrasanna } and { CBAkki }} , journal={{Communicated to International Journal of Information Technology and Computer Science}} , year={November, 2014} } @incollection{b28, , title={{A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing}} , author={{ BTPrasanna } and { CBAkki }} , journal={{Communicated to International Journal of Communication Networks and Distributed Systems}} , year={November, 2014} } @incollection{b29, , title={{A Survey on Challenges and Security Issues in Cloud}} , author={{ BTPrasanna } and { CBAkki }} , booktitle={{Conference on Evolutionary Trends in Information Technology}} Belgaum, Karnataka , year={May 20-22 2011} at Visvesvaraya Technological University }